Sticks and stones: Picking on users AND security pros
I took my share of name-calling as a kid. I did my share of name-calling, too. We're taught that nothing good comes of such behavior. I've been thinking a lot about that since writing an article two...
View ArticleTax office outlines penetration testing strategy - AusCERT 2011
Getting customers to recognise penetration testing as legitimate mitigation against potential hacks has proved vital for the Australian Taxation Office's (ATO) vulnerability management unit.
View ArticleHackers, Security Pros Talk Penetration Testing, Social Engineering
CIO.com goes undercover (sort of) at GrrCon, the Midwest's premier conference on penetration testing and software security, to learn about cloud security, hacking, lock picking and more.
View ArticleVerify the security of your mobile apps
The enterprise is increasingly turning to mobile app developers for solutions to leverage interest in BYOD. Gartner estimates that 70% of mobile professionals will conduct their work on personal smart...
View ArticleEthical hacking: Getting inside the minds of cyber criminals
Just when you think you’ve got yourself all covered on the security front, an attack comes out of nowhere and bites you on the arse. You think to yourself: How did I not see that coming?
View Article
More Pages to Explore .....